Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
HIFuzz: Human Interaction Fuzzing for Small Unmanned Aerial Vehicles
- Theodore Chambers,
- Michael Vierhauser,
- Ankit Agrawal,
- Michael Murphy,
- Jason Matthew Brauer,
- Salil Purandare,
- Myra B Cohen,
- Jane Cleland-Huang
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 266, Pages 1–14https://doi.org/10.1145/3613904.3642958Small Unmanned Aerial Systems (sUAS) must meet rigorous safety standards when deployed in high-stress emergency response scenarios; however many reported accidents have involved humans in the loop. In this paper, we, therefore, present the HiFuzz ...
- research-articleMay 2024
Comparing the Use and Usefulness of Four IoT Security Labels
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 827, Pages 1–31https://doi.org/10.1145/3613904.3642951There are currently multiple proposed security label designs for consumer products, with each prioritizing different security and privacy factors. These differences risk making product comparisons more confusing than informative. Standardized labels ...
Privacy Concerns of Student Data Shared with Instructors in an Online Learning Management System
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 661, Pages 1–16https://doi.org/10.1145/3613904.3642914Learning management systems are used for facilitating communication between instructors and students, dissemination of lecture materials, and grading of assignments. They collect large amounts of student data, necessary or otherwise, with or without ...
- research-articleMay 2024
Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing Devices
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 770, Pages 1–22https://doi.org/10.1145/3613904.3642897To address privacy concerns with the Internet of Things (IoT) devices, researchers have proposed enhancements in data collection transparency and user control. However, managing privacy preferences for shared devices with multiple stakeholders remains ...
- research-articleMay 2024Honorable Mention
A Comparative Long-Term Study of Fallback Authentication Schemes
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 970, Pages 1–19https://doi.org/10.1145/3613904.3642889Fallback authentication, the process of re-establishing access to an account when the primary authenticator is unavailable, holds critical significance. Approaches range from secondary channels like email and SMS to personal knowledge questions (PKQs) ...
-
"I Know I'm Being Observed:" Video Interventions to Educate Users about Targeted Advertising on Facebook
- Garrett Smith,
- Sarah Carson,
- Rhea G Vengurlekar,
- Stephanie Morales,
- Yun-Chieh Tsai,
- Rachel George,
- Josh Bedwell,
- Trevor Jones,
- Mainack Mondal,
- Brian Smith,
- Norman Makoto Su,
- Bart Knijnenburg,
- Xinru Page
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 112, Pages 1–27https://doi.org/10.1145/3613904.3642885Recent work explores how to educate and encourage users to protect their online privacy. We tested the efficacy of short videos for educating users about targeted advertising on Facebook. We designed a video that utilized an emotional appeal to explain ...
- research-articleMay 2024
"Things on the Ground are Different": Utility, Survival and Ethics in Multi-Device Ownership and Smartphone Sharing Contexts
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 760, Pages 1–14https://doi.org/10.1145/3613904.3642874As phones have become cheaper, there are still instances where people share them. Researchers have explored the sharing in the context of developing economies and brought to light the barriers to ownership and highlight the resulting power differentials. ...
- research-articleMay 2024
Encoding Privacy: Sociotechnical Dynamics of Data Protection Compliance Work
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 236, Pages 1–13https://doi.org/10.1145/3613904.3642872How do developers shape data protection regulations when they are passed from the policy arena to technical teams for compliance? This study explores data protection compliance work (DPCW) as a sociotechnical process mediated by developers’ attitudes ...
- research-articleMay 2024
Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in Pakistan
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 398, Pages 1–17https://doi.org/10.1145/3613904.3642871Non-Consensual Image-Disclosure Abuse (NCIDA) represents a subset of technology-facilitated sexual abuse where imagery and video with romantic or sexual connotations are used to control, extort, and otherwise harm victims. Despite considerable research ...
Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy Mechanisms
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 981, Pages 1–23https://doi.org/10.1145/3613904.3642863This paper explores how personal attributes, such as age, gender, technological expertise, or “need for touch”, correlate with people’s preferences for properties of tangible privacy protection mechanisms, for example, physically covering a camera. For ...
- research-articleMay 2024
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 826, Pages 1–60https://doi.org/10.1145/3613904.3642843Two popular approaches for helping consumers avoid phishing threats are phishing awareness videos and tools supporting users in identifying phishing emails. Awareness videos and tools have each been shown on their own to increase people’s phishing ...
- research-articleMay 2024
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering
- René Walendy,
- Markus Weber,
- Jingjie Li,
- Steffen Becker,
- Carina Wiesen,
- Malte Elson,
- Younghyun Kim,
- Kassem Fawaz,
- Nikol Rummel,
- Christof Paar
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 831, Pages 1–20https://doi.org/10.1145/3613904.3642837Trust in digital systems depends on secure hardware, often assured through HRE. This work develops methods for investigating human problem-solving processes in HRE, an underexplored yet critical aspect. Since reverse engineers rely heavily on visual ...
- research-articleMay 2024
Privacy of Default Apps in Apple’s Mobile Ecosystem
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 786, Pages 1–32https://doi.org/10.1145/3613904.3642831Users need to configure default apps when they first start using their devices. The privacy configurations of these apps do not always match what users think they have initially enabled. We first explored the privacy configurations of eight default apps ...
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter
- Juliane Schmüser,
- Harshini Sri Ramulu,
- Noah Wöhler,
- Christian Stransky,
- Felix Bensmann,
- Dimitar Dimitrov,
- Sebastian Schellhammer,
- Dominik Wermke,
- Stefan Dietze,
- Yasemin Acar,
- Sascha Fahl
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 574, Pages 1–16https://doi.org/10.1145/3613904.3642826The Russian Invasion of Ukraine in 2022 resulted in a rapidly changing cyber threat environment globally and incentivized the sharing of security and privacy advice on social media. Previous research found a strong impact of online security advice on end-...
- research-articleMay 2024
Understanding Users' Interaction with Login Notifications
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 853, Pages 1–17https://doi.org/10.1145/3613904.3642823Login notifications intend to inform users about sign-ins and help them protect their accounts from unauthorized access. Notifications are usually sent if a login deviates from previous ones, potentially indicating malicious activity. They contain ...
- research-articleMay 2024
Uncovering Human Traits in Determining Real and Spoofed Audio: Insights from Blind and Sighted Individuals
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 949, Pages 1–14https://doi.org/10.1145/3613904.3642817This paper explores how blind and sighted individuals perceive real and spoofed audio, highlighting differences and similarities between the groups. Through two studies, we find that both groups focus on specific human traits in audio–such as accents, ...
- research-articleMay 2024
PriviAware: Exploring Data Visualization and Dynamic Privacy Control Support for Data Collection in Mobile Sensing Research
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 787, Pages 1–17https://doi.org/10.1145/3613904.3642815With increased interest in leveraging personal data collected from 24/7 mobile sensing for digital healthcare research, supporting user-friendly consent to data collection for user privacy has also become important. This work proposes PriviAware, a ...
- research-articleMay 2024Best Paper
Sensible and Sensitive AI for Worker Wellbeing: Factors that Inform Adoption and Resistance for Information Workers
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 104, Pages 1–30https://doi.org/10.1145/3613904.3642716Algorithmic estimations of worker behavior are gaining popularity. Passive Sensing–enabled AI (PSAI) systems leverage behavioral traces from workers’ digital tools to infer their experience. Despite their conceptual promise, the practical designs of ...
Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy Management
- Lotus Zhang,
- Abigale Stangl,
- Tanusree Sharma,
- Yu-Yun Tseng,
- Inan Xu,
- Danna Gurari,
- Yang Wang,
- Leah Findlater
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 235, Pages 1–19https://doi.org/10.1145/3613904.3642713Blind individuals commonly share photos in everyday life. Despite substantial interest from the blind community in being able to independently obfuscate private information in photos, existing tools are designed without their inputs. In this study, we ...
- research-articleMay 2024
“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security Concerns
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 789, Pages 1–16https://doi.org/10.1145/3613904.3642705With the increasing usage of mental health applications (MHAs), there is growing concern regarding their data privacy practices. Analyzing 437 user reviews from 83 apps, we outline users’ predominant privacy and security concerns with currently ...